必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.231.21.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16420
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.231.21.139.			IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023091903 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 20 07:58:27 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
Host 139.21.231.30.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.21.231.30.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.139.161.79 attack
Jun 19 07:05:36 xxxxxxx7446550 sshd[19524]: Invalid user admin from 182.139.161.79
Jun 19 07:05:36 xxxxxxx7446550 sshd[19524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.139.161.79 
Jun 19 07:05:38 xxxxxxx7446550 sshd[19524]: Failed password for invalid user admin from 182.139.161.79 port 51626 ssh2
Jun 19 07:05:41 xxxxxxx7446550 sshd[19524]: Failed password for invalid user admin from 182.139.161.79 port 51626 ssh2
Jun 19 07:05:43 xxxxxxx7446550 sshd[19524]: Failed password for invalid user admin from 182.139.161.79 port 51626 ssh2
Jun 19 07:05:45 xxxxxxx7446550 sshd[19524]: Failed password for invalid user admin from 182.139.161.79 port 51626 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.139.161.79
2019-06-21 18:26:59
80.82.77.240 attack
[portscan] tcp/21 [FTP]
[portscan] tcp/22 [SSH]
[portscan] tcp/23 [TELNET]
[scan/connect: 6 time(s)]
*(RWIN=1024)(06211034)
2019-06-21 18:10:43
113.176.89.116 attackbots
Jun 21 11:21:23 MainVPS sshd[18127]: Invalid user csadmin from 113.176.89.116 port 33682
Jun 21 11:21:23 MainVPS sshd[18127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116
Jun 21 11:21:23 MainVPS sshd[18127]: Invalid user csadmin from 113.176.89.116 port 33682
Jun 21 11:21:25 MainVPS sshd[18127]: Failed password for invalid user csadmin from 113.176.89.116 port 33682 ssh2
Jun 21 11:23:38 MainVPS sshd[18275]: Invalid user pi from 113.176.89.116 port 56042
...
2019-06-21 18:29:30
113.101.158.7 attackbotsspam
Jun 21 11:20:09 xzibhostname postfix/smtpd[6124]: connect from unknown[113.101.158.7]
Jun 21 11:20:10 xzibhostname postfix/smtpd[6124]: warning: unknown[113.101.158.7]: SASL LOGIN authentication failed: authentication failure
Jun 21 11:20:10 xzibhostname postfix/smtpd[6124]: lost connection after AUTH from unknown[113.101.158.7]
Jun 21 11:20:10 xzibhostname postfix/smtpd[6124]: disconnect from unknown[113.101.158.7]
Jun 21 11:20:11 xzibhostname postfix/smtpd[6570]: connect from unknown[113.101.158.7]
Jun 21 11:20:12 xzibhostname postfix/smtpd[6570]: warning: unknown[113.101.158.7]: SASL LOGIN authentication failed: authentication failure
Jun 21 11:20:12 xzibhostname postfix/smtpd[6570]: lost connection after AUTH from unknown[113.101.158.7]
Jun 21 11:20:12 xzibhostname postfix/smtpd[6570]: disconnect from unknown[113.101.158.7]
Jun 21 11:20:12 xzibhostname postfix/smtpd[6124]: connect from unknown[113.101.158.7]
Jun 21 11:20:13 xzibhostname postfix/smtpd[6124]: warning:........
-------------------------------
2019-06-21 18:37:07
159.65.129.182 attack
Jun 21 11:28:54 * sshd[10650]: Failed password for root from 159.65.129.182 port 39218 ssh2
2019-06-21 18:17:56
121.200.48.58 attack
proto=tcp  .  spt=35704  .  dpt=25  .     (listed on Blocklist de  Jun 20)     (339)
2019-06-21 18:04:46
103.38.215.87 attack
Jun 17 11:21:03 cumulus sshd[12118]: Invalid user adria from 103.38.215.87 port 33938
Jun 17 11:21:03 cumulus sshd[12118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.215.87
Jun 17 11:21:05 cumulus sshd[12118]: Failed password for invalid user adria from 103.38.215.87 port 33938 ssh2
Jun 17 11:21:05 cumulus sshd[12118]: Received disconnect from 103.38.215.87 port 33938:11: Bye Bye [preauth]
Jun 17 11:21:05 cumulus sshd[12118]: Disconnected from 103.38.215.87 port 33938 [preauth]
Jun 17 11:24:36 cumulus sshd[12611]: Invalid user guest from 103.38.215.87 port 38112
Jun 17 11:24:36 cumulus sshd[12611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.215.87
Jun 17 11:24:38 cumulus sshd[12611]: Failed password for invalid user guest from 103.38.215.87 port 38112 ssh2
Jun 17 11:24:38 cumulus sshd[12611]: Received disconnect from 103.38.215.87 port 38112:11: Bye Bye [preauth]
Jun ........
-------------------------------
2019-06-21 18:03:43
200.85.46.6 attackbotsspam
Jun 21 11:52:32 vps65 postfix/smtpd\[24952\]: warning: unknown\[200.85.46.6\]: SASL LOGIN authentication failed: authentication failure
Jun 21 11:52:35 vps65 postfix/smtpd\[24952\]: warning: unknown\[200.85.46.6\]: SASL LOGIN authentication failed: authentication failure
Jun 21 11:52:39 vps65 postfix/smtpd\[24952\]: warning: unknown\[200.85.46.6\]: SASL LOGIN authentication failed: authentication failure
...
2019-06-21 18:29:00
162.243.151.153 attack
firewall-block, port(s): 161/udp
2019-06-21 17:50:17
60.246.0.75 attackspam
failed_logins
2019-06-21 17:41:44
122.114.77.167 attack
abuseConfidenceScore blocked for 12h
2019-06-21 18:22:40
109.228.58.164 attackspambots
20 attempts against mh-ssh on web1-pre.any-lamp.com
2019-06-21 17:43:35
151.225.105.166 attackbotsspam
Lines containing failures of 151.225.105.166
Jun 21 11:07:15 server01 postfix/smtpd[2923]: connect from 97e169a6.skybroadband.com[151.225.105.166]
Jun x@x
Jun x@x
Jun 21 11:07:16 server01 postfix/policy-spf[2931]: : Policy action=PREPEND Received-SPF: none (mapleleafmail.com: No applicable sender policy available) receiver=x@x
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=151.225.105.166
2019-06-21 18:47:33
203.195.243.146 attackspam
Jun 21 12:23:05 localhost sshd\[14865\]: Invalid user shen from 203.195.243.146 port 41764
Jun 21 12:23:05 localhost sshd\[14865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.243.146
Jun 21 12:23:07 localhost sshd\[14865\]: Failed password for invalid user shen from 203.195.243.146 port 41764 ssh2
2019-06-21 18:37:28
185.220.101.68 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.68  user=root
Failed password for root from 185.220.101.68 port 35288 ssh2
Failed password for root from 185.220.101.68 port 35288 ssh2
Failed password for root from 185.220.101.68 port 35288 ssh2
Failed password for root from 185.220.101.68 port 35288 ssh2
2019-06-21 18:42:19

最近上报的IP列表

102.129.152.219 20.68.190.8 213.161.234.27 152.116.210.194
166.182.77.71 146.70.171.245 68.235.43.101 198.44.136.137
43.225.189.146 206.21.25.67 210.63.41.173 11.164.60.52
6.5.53.215 2.118.116.38 66.44.107.4 103.157.96.41
190.18.150.10 154.28.188.32 74.81.152.104 89.49.171.154